Switches Flashcards

1
Q

What types of attacks are Switches vulnerable to?

A

MAC Flooding
MAC Spoofing
Physical Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is MAC Flooding?

A

An attempt to overwhelm the limited switch memory that is set aside to store the MAC addresses for each port.

Note: If the switch gets flooded, it can “fail-open” and start sending information out to every port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is MAC Spoofing?

A

This occurs when an attacker masks their own MAC address to pretend they are another MAC address.

Note: MAC spoofing is often combined with ARP spoofing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Physical Tampering?

A

The attacker gains physical access to the switch and can do a number of things to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What layer of the OSI Model is the switch?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly